Key (cryptography)

Known as: Encryption key, Cryptographic key, Key (cryptology) 
In cryptography, a key is a piece of information (a parameter) that determines the functional output of a cryptographic algorithm. For encryption… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2004
Highly Cited
2004
  • M. Maurer
  • 2004
The problem of generating a shared secret key S by two parties knowing dependent random variables X and I’, respectively, but not… (More)
Is this relevant?
Highly Cited
2003
Highly Cited
2003
Cryptographic computations are often carried out on insecure devices for which the threat of key exposure represents a serious… (More)
Is this relevant?
Highly Cited
2002
Highly Cited
2002
Distributed Sensor Networks (DSNs) are ad-hoc mobile networks that include sensor nodes with limited computation and… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 5
  • figure 4
Is this relevant?
Highly Cited
2001
Highly Cited
2001
We propose a technique to reliably generate a cryptographic key from a user's voice while speaking a password. The key resists… (More)
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
Highly Cited
2000
Highly Cited
2000
In this article we give guidelines for the determination of cryptographic key sizes. Our recommendations are based on a set of… (More)
Is this relevant?
Highly Cited
1998
Highly Cited
1998
Informal arguments that cryptographic protocols are secure can be made rigorous using inductive definitions. The approach is… (More)
  • figure 4
Is this relevant?
Highly Cited
1997
Highly Cited
1997
In September 1996 Boneh, Demillo, and Lipton from Bellcore announced a new type of cryptanalytic attack which exploits… (More)
Is this relevant?
Highly Cited
1996
Highly Cited
1996
The use of cryptographic hash functions like MD5 or SHA-1 for message authentication has become a standard approach in many… (More)
Is this relevant?
Highly Cited
1992
Highly Cited
1992
Classic cryptographic protocols based on user-chosen keys allow an attacker to mount password-guessing attacks. A combination of… (More)
Is this relevant?
Highly Cited
1990
Highly Cited
1990
We describe initial results from an apparatus and protocol designed to implement quantum public key distribution, by which two… (More)
Is this relevant?